Skip to main content

Quantum Cryptography and Quantum Teleportation

  • Chapter
  • First Online:
The Amazing World of Quantum Computing

Part of the book series: Undergraduate Lecture Notes in Physics ((ULNP))

  • 2943 Accesses

Abstract

This chapter is meant to be an appetizer and lightly relies on the reader’s intuition to understand the mathematical steps involved. The chapter directly introduces two quantum algorithms: (1) How to encrypt messages (cryptography), which if snooped upon during transmission to a recipient, will be detected; and (2) how to teleport the state of a quantum object. Along the way just enough intuitively understandable but weird and exclusive aspects of quantum mechanics as compared to classical mechanics are introduced.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 69.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Feynman [15], Chap. 6.

  2. 2.

    Feynman [15].

  3. 3.

    Turing [31].

  4. 4.

    Wootters and Zurek [33].

  5. 5.

    As quoted in: Mermin [20]. “Einstein maintained that quantum metaphysics entails spooky actions at a distance; experiments have now shown that what bothered Einstein is not a debatable point but the observed behaviour of the real world.”

  6. 6.

    See the following three papers to develop a perspective on how physicists came to understand entanglement: Einstein et al. [14], Bell [6], and Aspect et al. [3].

  7. 7.

    All four postulates are formally described in Chap. 2, Sect. 2.7.

  8. 8.

    Schumacher [26].

  9. 9.

    See Barenco et al. [4]. See also Chap. 7 of this book.

  10. 10.

    Developed by Gilbert S. Vernam of AT&T. This is the only known totally secure cypher. Vernam was granted a patent protecting the cypher: Secret Signaling System. US Patent No. 1,310, 719, patented July 22, 1919.

  11. 11.

    Shannon [27]. See also: Goldreich [18]; Black et al. [9], pp. 189–244, Sect. 5.

  12. 12.

    Rivest et al. [25]. See also: Allenby and Redfern [2]. Rivest, Shamir, and Adleman received the Turing award for 2002 for their contributions to public key cryptography . http://www.acm.org/announcements/turing_2002.html.

  13. 13.

    Bennett and Brassard [7]. The first quantum cryptography ideas were proposed by Stephen Wiesner in the late 1960s, but unfortunately were not accepted for publication at the time! It was eventually published in 1983, Wiesner [32]. Bennett and Brassard built upon Wiesner’s work. A simple proof of the security of the BB84 protocol was provided by Shor and Preskill [28]. See also: Brassard and Crépeau [11] and Brassard [10].

  14. 14.

    Qiu [23]. See also: Muralidharan [21].

  15. 15.

    Giles [17].

  16. 16.

    Bennett et al. [8].

  17. 17.

    Riebe et al. [24] and Barrett et al. [5].

  18. 18.

    Polzik et al. [22].

  19. 19.

    Bussieres et al. [12].

  20. 20.

    Tsurumoto et al. [30].

  21. 21.

    See, e.g., Alba [1] and Gibney [16].

  22. 22.

    Castelvecchi [13].

  23. 23.

    For an easy to understand reference for eigenvalues and eigenvectors, see Chap. 6, http://math.mit.edu/~gs/linearalgebra/ila0601.pdf in Strang [29].

References

  1. D. Alba, in China Unveils Secret Quantum Communications Experiment, IEEE Spectrum, 13 June 2013. http://spectrum.ieee.org/tech-talk/aerospace/satellites/china-unveils-secret-quantum-communications-experiment

  2. R.B.J.T. Allenby, E.J Redfern, in Introduction to Number Theory with Computing (Edward Arnold, London, 1989), pp. 279–284

    Google Scholar 

  3. A. Aspect, J. Dalibard, G. Roger, Experimental test of bell’s inequalities using time-varying analyzers. Phys. Rev. Lett. 49(25), 1804–1807 (20 Dec 1982). http://www.drchinese.com/David/Aspect.pdf. This paper provided experimental evidence that over-ruled Einstein’s objections described in his EPR paper

  4. A. Barenco, C.H. Bennett, R. Cleve, D.P. DiVincenzo, N. Margolus, P. Shor, T. Sleator, J.A. Smolin, H. Weinfurter, Elementary gates for quantum computation. Phys. Rev. A 52, 3457–3467 (1995). arXiv:quant-ph/9503016v1. 23 Mar 1995. https://arxiv.org/pdf/quant-ph/9503016.pdf

  5. M.D. Barrett et al., Deterministic quantum teleportation of atomic qubits. Nature 429, 737–739 (2004)

    Article  Google Scholar 

  6. J.S. Bell, On the Einstein Podolsky Rosen paradox. Physics 1, 195–200 (1964). http://www.drchinese.com/David/Bell.pdf. It contains Bell’s theorem related to entangled pairs. The mathematical proof is brilliant and relatively straightforward

  7. C.H. Bennett, G. Brassard, Quantum Cryptography: Public Key Distribution and Coin Tossing, in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, IEEE, New York (The conference was held at Bangalore, India, Dec 1984), pp. 175–179

    Google Scholar 

  8. C.H. Bennett, G. Brassard, C. Crepeau, R. Jozsa, A. Peres, W. Wootters, Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 1895–1899 (1993)

    Google Scholar 

  9. P.E. Black, D. Richard Kuhn, C.J. Williams, in Quantum Computing and Communications, Advances in Computers, vol. 56 (Academic Press, 2002)

    Google Scholar 

  10. G. Brassard, in Brief History of Quantum Cryptography: A Personal Perspective (2006). arXiv:quant-ph/0604072v1 11 Apr 2006. https://arxiv.org/pdf/quant-ph/0604072.pdf

  11. G. Brassard, C. Crépeau, in Cryptology Column—25 Years of Quantum Cryptography (ACM SIGACT News · Sept 1996), pp. 1–12. https://www.researchgate.net/publication/220556114_25_years_of_quantum_cryptography

  12. F. Bussieres et al., in Quantum Teleportation from A Telecom-Wavelength Photon To A Solid-State Quantum Memory (2014). arxiv.org/abs/1401.6958, 27 Jan 2014. http://arxiv.org/abs/1401.6958

  13. D. Castelvecchi, China’s quantum satellite clears major hurdle on way to ultrasecure communications. Nature, 15 June 2017. https://www.nature.com/news/china-s-quantum-satellite-clears-major-hurdle-on-way-to-ultrasecure-communications-1.22142

  14. A. Einstein, B. Podolsky, N. Rosen, Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 41, pp. 777–780 (1935). http://www.drchinese.com/David/EPR.pdf. Known as the EPR paper, it claimed that QM was an incomplete theory. After Einstein died in 1955, John Bell and others would prove him wrong

  15. R. Feynman, in The Character of Physical Law, Modern Library Edition, 1994 (Originally published by BBC in 1965, and in paperback by MIT Press, 1967, 1965)

    Google Scholar 

  16. E. Gibney, Chinese satellite is one giant step for the quantum internet. Nature 27 July 2016 (updated 16 Aug 2016). http://www.nature.com/news/chinese-satellite-is-one-giant-step-for-the-quantum-internet-1.20329

  17. M. Giles, The man turning china into a quantum superpower. MIT Technol. Rev. 19 Dec 2018 (1965). https://www.technologyreview.com/s/612596/the-man-turning-china-into-a-quantum-superpower/

  18. O. Goldreich, Foundations of Cryptography, vol. 2 (Cambridge University Press, 2004). http://www.wisdom.weizmann.ac.il/~oded/foc-book.html

  19. J.P. Lewis (2001) Large limits to software estimation. ACM Softw. Eng. Notes 26(4), 54–59

    Google Scholar 

  20. N.D. Mermin (1985) Is the moon there when nobody looks? Real. Quant. Theory, Phys. Today 38–47. http://maltoni.web.cern.ch/maltoni/PHY1222/mermin_moon.pdf

  21. S. Muralidharan et al., in Efficient Long Distance Quantum Communication (2015). arXiv:1509.08435v1 [quant-ph], 28 Sept 2015, http://arxiv.org/pdf/1509.08435v1.pdf

  22. E.S. Polzik et al., Quantum teleportation between light and matter. Nature 443, 557–560 (2006)

    Article  Google Scholar 

  23. J. Qiu, Quantum communications leap out of the lab. Nature 508, 441–442 (2014). http://www.nature.com/polopoly_fs/1.15093!/menu/main/topColumns/topLeftColumn/pdf/508441a.pdf

  24. M. Riebe et al., Deterministic quantum teleportation with atoms. Nature 429, 734–737 (2004)

    Article  Google Scholar 

  25. R.L. Rivest, A. Shamir, L.M. Adleman, A method of obtaining digital signatures and public-key cryptosystems. Comm. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  26. B. Schumacher, Quantum coding. Phys. Rev. A 5(4), 2738–2747 (1995)

    Article  MathSciNet  Google Scholar 

  27. C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (Oct 1949) (The material in this paper appeared originally in a confidential report “A Mathematical Theory of Cryptography” dated Sept. 1, 1945, which has now been declassified.). http://pages.cs.wisc.edu/~rist/642-spring-2014/shannon-secrecy.pdf

  28. P. W. Shor, J. Preskill, Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000). arXiv quant-ph/0003004, 2000. http://arxiv.org/PS_cache/quant-ph/pdf/0003/0003004.pdf

  29. G. Strang (2014) in Differential Equations and Linear Algebra (Wellesley-Cambridge Press, MA, 2014)

    Google Scholar 

  30. K. Tsurumoto, R. Kuroiwa, H. Kano, Y, Sekiguchi, H. Kosaka, Quantum teleportation-based state transfer of photon polarization into a carbon spin in diamond. Commun. Phys. 2(74) (2019). https://www.nature.com/articles/s42005-019-0158-0

  31. A. Turing (1936) On computable numbers, with an application to the Entscheidungs problem, in Proceedings of the London Mathematical Society, Series 2, vol. 42, pp. 230–265; Errata (1937), vol. 43, pp. 544–546. http://www.abelard.org/turpap2/tp2-ie.asp

  32. S. Wiesner, Conjugate coding. Sigact News 15(1), 78–88 (1983). (Original manuscript written circa 1969)

    Article  Google Scholar 

  33. W.K. Wootters, W.H. Zurek, A single quantum cannot be cloned. Nature, 299, 802–803 (1982). http://puhep1.princeton.edu/~mcdonald/examples/QM/woottersnature29980282.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajendra K. Bera .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bera, R.K. (2020). Quantum Cryptography and Quantum Teleportation. In: The Amazing World of Quantum Computing. Undergraduate Lecture Notes in Physics. Springer, Singapore. https://doi.org/10.1007/978-981-15-2471-4_1

Download citation

Publish with us

Policies and ethics